51 results on '"Key generation"'
Search Results
2. An innovative image encryption algorithm enhanced with the Pan-Tompkins Algorithm for optimal security
3. CCM-PRNG: Pseudo-random bit generator based on cross-over chaotic map and its application in image encryption
4. HE-AO: An Optimization-Based Encryption Approach for Data Delivery Model in A Multi-Tenant Environment
5. A fast verifiable fully homomorphic encryption technique for secret computation on cloud data
6. Enhancing biometric authentication security through the novel integration of graph theory encryption and chaotic logistic mapping
7. Establishment of secure and authentic data security framework in wireless sensor network using key reconciliation
8. Cryptanalysis and security evaluation of optimized algorithms for image encryption in deep optimal network
9. SSKA: secure symmetric encryption exploiting Kuznyechik algorithm for trustworthy communication
10. IoT cryptography with privacy-preserving ElGamal public key cryptosystem using oppositional artificial flora optimization algorithm
11. Decentralized blockchain-based security enhancement with lamport merkle digital signature generation and optimized encryption in cloud environment
12. A plaintext-related image encryption scheme based on key generation using generative adversarial networks
13. A multi-objective privacy preservation model for cloud security using hunter prey optimization algorithm
14. A Low Bit Instability CMOS PUF Based on Current Mirrors and WTA Cells
15. Deep learning with metaheuristics based data sensing and encoding scheme for secure cyber physical sensor systems
16. Efficient Key Generation Techniques for Wireless Body Area Network
17. Design and Simulation of Physical Layer Security for Next Generation Intelligent Optical Networks
18. Crytographical primitive for blockchain: a secure random DNA encoded key generation technique
19. Opposition Based Joint Grey Wolf-Whale Optimization Algorithm Based Attribute Based Encryption in Secure Wireless Communication
20. A Secured Storage and Communication System for Cloud Using ECC, Polynomial Congruence and DSA
21. Low Complexity Preprocessing Approach for Wireless Physical Layer Secret Key Extraction Based on PCA
22. Establishing and validating secured keys for IoT devices: using P3 connection model on a cloud-based architecture
23. Pairing-Free Identity-Based Digital Signature Algorithm for Broadcast Authentication Based on Modified ECC Using Battle Royal Optimization Algorithm
24. An Efficient Enhanced Full Homomorphic Encryption for Securing Video in Cloud Environment
25. Dynamic resource provisioning and secured file sharing using virtualization in cloud azure
26. CCSC—DHKEP: Data Confidentiality Using Improved Security Approaches in Cloud Environment
27. A novel approach for Chaotic image Encryption based on block level permutation and bit-wise substitution
28. QMLFD Based RSA Cryptosystem for Enhancing Data Security in Public Cloud Storage System
29. A Non-Time-Limited Channel Sounding Protocol for Key Generation
30. RETRACTED ARTICLE: Architectural framework and simulation of quantum key optimization techniques in healthcare networks for data security
31. A Matrix Translation and Elliptic Curve Based Cryptosystem for Secured Data Communications in WSNs
32. Embedding asymmetric backdoors into the RSA key generator
33. ECC-CRT: An Elliptical Curve Cryptographic Encryption and Chinese Remainder Theorem based Deduplication in Cloud
34. An efficient data transmission approach using IAES-BE
35. Vehicular networks with security and trust management solutions: proposed secured message exchange via blockchain technology
36. An ASCII based effective and multi-operation image encryption method
37. Actively Secure Setup for SPDZ
38. An efficient Minkowski distance-based matching with Merkle hash tree authentication for biometric recognition in cloud computing
39. A lightweight physical-layer based security strategy for Internet of things
40. A fully homomorphic–elliptic curve cryptography based encryption algorithm for ensuring the privacy preservation of the cloud data
41. Fuzzy enhanced secure multicast routing for improving authentication in MANET
42. SMEER: Secure Multi-tier Energy Efficient Routing Protocol for Hierarchical Wireless Sensor Networks
43. Physical-Layer-Security Box: a concept for time-frequency channel-reciprocity key generation
44. Efficient key generation leveraging channel reciprocity and balanced gray code
45. Signature Verification and Bloom Hashing Technique for Efficient Cloud Data Storage
46. Efficient physical layer key generation technique in wireless communications
47. Secure key generation from biased PUFs: extended version
48. Multi-dimensional key generation of ICMetrics for cloud computing
49. SERA: a secure energy reliability aware data gathering for sensor networks
50. Genetic-based random key generator (GRKG): a new method for generating more-random keys for one-time pad cryptosystem
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.